D4rkz3rO's Stars
dafthack/GraphRunner
A Post-exploitation Toolset for Interacting with the Microsoft Graph API
anrbn/GATOR
GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments
Orange-Cyberdefense/LinikatzV2
linikatz is a tool to attack AD on UNIX
franc-pentest/ldeep
In-depth ldap enumeration utility
lutzenfried/Methodology
AD-Security/AD_Miner
AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses
invictus-ir/Invictus-AWS
A tool for AWS incident response, that allows for enumeration, acquisition and analysis of data from AWS environments for the purpose of incident response.
EntySec/Ghost
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
g0ldencybersec/CloudRecon
nyxgeek/guestlist
tool for identifying guest relationships between companies
jsa2/AADAppAudit
Microsoft Entra ID App Audit Solution (AADAppAudit)
HackmichNet/AzTokenFinder
BishopFox/iam-vulnerable
Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground.
tenable/cnappgoat-scenarios
This repository provides a comprehensive collection of Pulumi scenarios utilized by cnappgoat
tenable/cnappgoat
CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.
toniblyx/my-arsenal-of-aws-security-tools
List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.
Netflix-Skunkworks/policyuniverse
Parse and Process AWS IAM Policies, Statements, ARNs, and wildcards.
PankajMoolrajani/PermCutter
Spec and Sample code for Identifying and Reducing Permission Explosion
salesforce/cloudsplaining
Cloudsplaining is an AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized report.
NetSPI/FuncoPop
Tools for attacking Azure Function Apps
talmaor/AzureADLateralMovement
Lateral Movement graph for Azure Active Directory
Pyr0sec/IAMagic
Advanced AWS Access Credentials Scanner ⚡
leechristensen/RequestAADRefreshToken
redhuntlabs/BucketLoot
BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for custom keywords as well as Regular Expressions from publicly-exposed storage buckets by scanning files that store data in plain-text.
foxlox/GIUDA
Ask a TGS on behalf of another user without password
zblurx/dploot
DPAPI looting remotely and locally in Python
anirudhbiyani/findmytakeover
find dangling domains in a multi cloud environment
RhinoSecurityLabs/IAMActionHunter
An AWS IAM policy statement parser and query tool.
primeharbor/sensitive_iam_actions
Crowdsourced list of sensitive IAM Actions
WithSecureLabs/awspx
A graph-based tool for visualizing effective access and resource relationships in AWS environments.